<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP auth not working for Palo login in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593620#M118148</link>
    <description>&lt;P&gt;All firewalls within the network use default management for all services so I believe this is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the dropdown it states read only on the firewall..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAllen_0-1722420096596.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61257iAA98B885110216AB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MAllen_0-1722420096596.png" alt="MAllen_0-1722420096596.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jul 2024 10:01:43 GMT</pubDate>
    <dc:creator>M.Allen</dc:creator>
    <dc:date>2024-07-31T10:01:43Z</dc:date>
    <item>
      <title>LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593495#M118122</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I have deployed a new Palo and configured LDAP auth but I am getting an error. I checked the BIND account is active and all settings appear ok, anything else to troubleshoot this?&lt;/P&gt;
&lt;P&gt;Reason: Internal error, e.g. network connection, DNS failure or remote server down.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAllen_0-1722337236638.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61224i3E478716BE48B280/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MAllen_0-1722337236638.png" alt="MAllen_0-1722337236638.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 11:01:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593495#M118122</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-30T11:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593497#M118123</link>
      <description>&lt;P&gt;the destination LDAP server is allowed to authenticate users? (RODC will not be able to perform this function i think)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- do you have service connections configured?&lt;/P&gt;
&lt;P&gt;- did you double-check connectivity is allowed (in the ldap profile, click the 'Base DN' dropdown to see if the domain loads)&lt;/P&gt;
&lt;P&gt;- run a tcpdump from cli listening for port 389 or 636 to see if your connections go out and get replied to&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 11:37:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593497#M118123</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-30T11:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593513#M118129</link>
      <description>&lt;P&gt;Thanks for your reply Reaper.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where would I configure service connections, I do not think I have done that part..&lt;/P&gt;
&lt;P&gt;Also for checking connectivity there is no drop down option within the ldap profile as seen below..&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAllen_0-1722348956190.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61226i343C110D92F58C93/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MAllen_0-1722348956190.png" alt="MAllen_0-1722348956190.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 14:16:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593513#M118129</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-30T14:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593605#M118145</link>
      <description>&lt;P&gt;Service connections are in device &amp;gt; setup &amp;gt; services &amp;gt;service route configuration&lt;/P&gt;
&lt;P&gt;In regards to the dropdown, this will only work when you do this from the firewall, not panorama&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 07:54:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593605#M118145</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-31T07:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593620#M118148</link>
      <description>&lt;P&gt;All firewalls within the network use default management for all services so I believe this is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the dropdown it states read only on the firewall..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAllen_0-1722420096596.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61257iAA98B885110216AB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MAllen_0-1722420096596.png" alt="MAllen_0-1722420096596.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 10:01:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593620#M118148</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-31T10:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593621#M118149</link>
      <description>&lt;P&gt;Here is the tcpdump...&lt;/P&gt;
&lt;P&gt;admin@Firewall01&amp;gt; view-pcap mgmt-pcap mgmt.pcap&lt;/P&gt;
&lt;P&gt;reading from file /opt/pan/.debug/mgmtpcap/mgmt.pcap, link-type EN10MB (Ethernet)&lt;/P&gt;
&lt;P&gt;11:28:37.895803 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [S], seq 3465360357, win 29200, options [mss 1460,sackOK,TS val 414589708 ecr 0,nop,wscale 7], length 0&lt;/P&gt;
&lt;P&gt;11:28:37.896330 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47368: Flags [S.], seq 2111673635, ack 3465360358, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;/P&gt;
&lt;P&gt;11:28:37.896392 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [.], ack 1, win 229, length 0&lt;/P&gt;
&lt;P&gt;11:28:37.897962 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 1:290, ack 1, win 229, length 289&lt;/P&gt;
&lt;P&gt;11:28:37.899518 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47368: Flags [P.], seq 1:3773, ack 290, win 8212, length 3772&lt;/P&gt;
&lt;P&gt;11:28:37.899560 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [.], ack 3773, win 288, length 0&lt;/P&gt;
&lt;P&gt;11:28:37.911228 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 290:460, ack 3773, win 288, length 170&lt;/P&gt;
&lt;P&gt;11:28:37.912785 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47368: Flags [P.], seq 3773:3824, ack 460, win 8211, length 51&lt;/P&gt;
&lt;P&gt;11:28:37.912992 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 460:565, ack 3824, win 288, length 105&lt;/P&gt;
&lt;P&gt;11:28:37.913689 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47368: Flags [P.], seq 3824:3963, ack 565, win 8211, length 139&lt;/P&gt;
&lt;P&gt;11:28:37.913934 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 565:601, ack 3963, win 310, length 36&lt;/P&gt;
&lt;P&gt;11:28:37.913976 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 601:632, ack 3963, win 310, length 31&lt;/P&gt;
&lt;P&gt;11:28:37.914003 IP 10.240.199.241.47368 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [F.], seq 632, ack 3963, win 310, length 0&lt;/P&gt;
&lt;P&gt;11:28:37.914453 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47368: Flags [R.], seq 3963, ack 632, win 0, length 0&lt;/P&gt;
&lt;P&gt;11:28:39.128436 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [S], seq 2893699587, win 29200, options [mss 1460,sackOK,TS val 414590940 ecr 0,nop,wscale 7], length 0&lt;/P&gt;
&lt;P&gt;11:28:39.128969 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [S.], seq 1970587809, ack 2893699588, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;/P&gt;
&lt;P&gt;11:28:39.129018 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [.], ack 1, win 229, length 0&lt;/P&gt;
&lt;P&gt;11:28:39.130518 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 1:290, ack 1, win 229, length 289&lt;/P&gt;
&lt;P&gt;11:28:39.132071 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [.], seq 1:2921, ack 290, win 8212, length 2920&lt;/P&gt;
&lt;P&gt;11:28:39.132109 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [.], ack 2921, win 274, length 0&lt;/P&gt;
&lt;P&gt;11:28:39.132124 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [P.], seq 2921:3773, ack 290, win 8212, length 852&lt;/P&gt;
&lt;P&gt;11:28:39.132143 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [.], ack 3773, win 297, length 0&lt;/P&gt;
&lt;P&gt;11:28:39.145406 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 290:460, ack 3773, win 297, length 170&lt;/P&gt;
&lt;P&gt;11:28:39.147020 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [P.], seq 3773:3824, ack 460, win 8211, length 51&lt;/P&gt;
&lt;P&gt;11:28:39.147353 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 460:565, ack 3824, win 297, length 105&lt;/P&gt;
&lt;P&gt;11:28:39.148024 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [P.], seq 3824:3963, ack 565, win 8211, length 139&lt;/P&gt;
&lt;P&gt;11:28:39.148655 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 565:601, ack 3963, win 320, length 36&lt;/P&gt;
&lt;P&gt;11:28:39.148700 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [P.], seq 601:632, ack 3963, win 320, length 31&lt;/P&gt;
&lt;P&gt;11:28:39.148727 IP 10.240.199.241.47376 &amp;gt; TWDC05.XXX.XXX.UK.ldaps: Flags [F.], seq 632, ack 3963, win 320, length 0&lt;/P&gt;
&lt;P&gt;11:28:39.149190 IP TWDC05.XXX.XXX.UK.ldaps &amp;gt; 10.240.199.241.47376: Flags [R.], seq 3963, ack 601, win 0, length 0&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 10:34:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593621#M118149</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-31T10:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593622#M118150</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1252419965"&gt;@M.Allen&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your issue can have multiple causes:&lt;/P&gt;
&lt;P&gt;First, I would check&amp;nbsp;&lt;STRONG&gt;Bind DN&lt;/STRONG&gt;. It's needed the full Bind DN (&lt;A href="https://advanxer.com/2017/08/how-to-obtain-the-base-dn-or-bind-dn-attributes-from-active-directory/" target="_blank" rel="noopener"&gt;https://advanxer.com/2017/08/how-to-obtain-the-base-dn-or-bind-dn-attributes-from-active-directory/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Then you need to be sure that the SSL certificate presented by the server it's trusted for the firewall. Maybe you need to import some Enterprise CA into your firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can look also in auth.log for the problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;less mp-log authd.log&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 10:35:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593622#M118150</guid>
      <dc:creator>CosminM</dc:creator>
      <dc:date>2024-07-31T10:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593665#M118161</link>
      <description>&lt;P&gt;Hi Cosim,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Thanks for that. I have added the certs as they were missing and re-added the Bind DN and password.&lt;/P&gt;
&lt;P&gt;I can see in the logs the errors below. Do I require a policy to allow a connection to the DNS or LDAP servers as I have not added any..&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAllen_0-1722442751674.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61265i2D479C44B45F472D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MAllen_0-1722442751674.png" alt="MAllen_0-1722442751674.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 16:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593665#M118161</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-31T16:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593673#M118164</link>
      <description>&lt;P&gt;I can ping the DNS name of the LDAP servers from the firewall CLI, and traceroute without issue&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 17:00:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593673#M118164</guid>
      <dc:creator>M.Allen</dc:creator>
      <dc:date>2024-07-31T17:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth not working for Palo login</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593726#M118176</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1252419965"&gt;@M.Allen&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;based on tcpdump output it looks like your LDAP server is sending RST.&lt;/P&gt;
&lt;P&gt;To narrow down the issue, could you temporarily disabled LDAPS by deselecting: "Require SSL/TLS secured connection". If it works with LDAP, the the issue is likely related to certificate. Make sure that entire enterprise CA chain is imported into Firewall.&lt;/P&gt;
&lt;P&gt;If it still does not work even after disabling LDAPS, then next step would looking into details of&amp;nbsp;authd.log. Also make sure that BIND DN account is not locked out/disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 03:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-not-working-for-palo-login/m-p/593726#M118176</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-08-01T03:31:42Z</dc:date>
    </item>
  </channel>
</rss>

